What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Cybereason.png 2023-11-28 15:41:00 THREAT ALERT: DJvu Variant Delivered by Loader Masquerading as Freeware (lien direct) THREAT ALERT: DJvu Variant Delivered by Loader Masquerading as Freeware
Cybereason.png 2023-11-27 16:07:26 2024 Cybersecurity Predictions - Generative AI Reshapes Cybersecurity (lien direct) 2024 Cybersecurity Predictions I can't believe another year has flown by, but wow what a year it's been! I suspect many of us saw smartphones and the cloud as the biggest transformations of our generation, but the reality is that these have been gazumped by the introduction of generative AI. Prediction ★★
Cybereason.png 2023-11-20 18:11:31 Alerte de menace: Ransomware INC
THREAT ALERT: INC Ransomware
(lien direct)

THREAT ALERT: INC Ransomware
Ransomware Threat ★★★
Cybereason.png 2023-10-25 13:30:00 Sécurité des informations du réseau de l'UE
EU Network Information Security
(lien direct)

EU Network Information Security
★★
Cybereason.png 2023-10-24 13:00:00 2023 Détection et réponse prolongée (XDR) Guide de l'acheteur \\
2023 Extended Detection & Response (XDR) Buyer\\'s Guide
(lien direct)
★★
Cybereason.png 2023-10-23 14:03:56 Toute la sécurité EPP n'est pas la même - changer le garde!
NOT all EPP Security is the Same - Changing the Guard!
(lien direct)
Toute la sécurité EPP n'est pas la même - changer la garde! Lorsque j'ai commencé à antivirus en 1991, la solution était simple: trouver un identifiant unique pour détecter les logiciels malveillants, alors vous pouvez le bloquer et si nécessaire, inciter les bonnes étapes programmatiques pour récupérer.Alan Salomon dirait que c'est un problème mathématique, nous avons la solution, et nous pouvons l'étendre infiniment.Cependant, au fil des ans, les menaces, les solutions et les environnements dans lesquels nous les déployons sont devenus de plus en plus complexes.Nous sommes passés à partir de virus de fichiers qui étaient un objet simple à des attaques de ransomwares multiples complexes composées de centaines d'éléments.Tout comme un exemple si vous regardez le Dernier test de mitres , il a utilisé Turla qui est composé de 143objets (indicateurs & amp; comportements liés à l'attaque). & nbsp;
NOT all EPP Security is the Same - Changing the Guard! When I started in anti-virus back in 1991, the solution was simple: find a unique identifier to detect the malware, then you could block it and if needed instigate the right programmatic steps to recover. Alan Solomon would say it\'s a math problem, we have the solution, and we can scale it infinitely. However, over the years threats, the solutions and the environments we deploy them into have become ever more complex. We have moved from file viruses that were one simple object to complex multifaceted ransomware attacks made up of hundreds of elements. Just as an example if you look at the latest MITRE testing, it used Turla which is made up of 143 objects (Indicators & behaviors linked to the attack). 
Ransomware ★★★
Cybereason.png 2023-10-06 17:53:23 Analyse des menaces: prendre des raccourcis… en utilisant des fichiers LNK pour l'infection initiale et la persistance
THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence
(lien direct)

THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence
Threat ★★★
Cybereason.png 2023-09-20 13:10:48 La cyberison établit la nouvelle norme de l'industrie en 2023 Évaluations de Mitre ATT & CK: Enterprise
Cybereason Sets the New Industry Standard in 2023 MITRE ATT&CK Evaluations: Enterprise
(lien direct)
cyberison établit la nouvelle norme de l'industrie en 2023 mitre att & amp; CK Evaluations: Enterprise Fresh Off the Press: Les résultats de la 2023 MITER ENNÉNUITION ATT & AMP; CK & reg; Évaluations: Entreprise ont été publiés, mettant 30 solutions de sécurité au test dans des scénarios réels qui imitent l'acteur de la menace Turla.
Cybereason Sets the New Industry Standard in 2023 MITRE ATT&CK Evaluations: Enterprise Fresh off the press: the results of the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise have been published, putting 30 security solutions to the test in real world scenarios that mimic the Turla threat actor.
Threat ★★
Cybereason.png 2023-09-13 14:47:38 La capacité de cybersécurité que l'industrie a presque oublié
The Cybersecurity Capability the Industry Nearly Forgot
(lien direct)
La capacité de cybersécurité L'industrie a presque oublié Lorsque j'ai commencé en cybersécurité au début des 90 \\, des capacités de cybersécurité entières n'étaient que quelques Mo de taille et s'adapteraient sur quelques disquettes.Aujourd'hui, de nombreuses capacités de cybersécurité sont si grandes et complexes qu'elles s'appuient sur le cloud computing, soit pour la vitesse de traitement, soit la possibilité de tirer parti de grands ensembles de données utilisés par exemple avec l'apprentissage automatique dans le cadre des capacités de détection et de réponse. & Nbsp; & nbsp;
The Cybersecurity Capability the Industry Nearly Forgot When I started in cybersecurity back in the early 90\'s, entire cyber security capabilities were just a couple of MB in size and would fit on a couple of floppy disks. Today, many cyber security capabilities are so big and complex that they rely on cloud computing, either for processing speed or the ability to leverage large data sets used in for example with Machine Learning as part of the detection and response capabilities.  
Cloud ★★
Cybereason.png 2023-08-22 20:24:00 Podcast Malicious Life : L’IA générative est-elle dangereuse ?
Malicious Life Podcast: Is Generative AI Dangerous?
(lien direct)
 Podcast Malicious Life : l'IA générative est-elle dangereuse ? De temps en temps, l'ensemble du paysage de la cybersécurité change d'un seul coup : le dernier changement sismique dans le domaine s'est produit l'année dernière seulement.Ainsi, dans cet épisode de Malicious Life, nous allons nous pencher sur l'avenir de la cybersécurité : comment l'IA générative comme ChatGPT va changer le cyberespace, à travers les yeux de cinq équipes de recherche innovatrices dans le domaine.Nous commencerons par des choses simples, puis nous passerons progressivement à des exemples de plus en plus complexes et futuristes montrant comment cette technologie pourrait bien se retourner contre nous, nous obligeant à résoudre des problèmes que nous n'avions jamais envisagés auparavant. – ;vérifiez-le...
Malicious Life Podcast: Is Generative AI Dangerous? Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we\'re going to take a look into the future of cybersecurity: at how generative AI like ChatGPT will change cyberspace, through the eyes of five research teams breaking ground in the field. We\'ll start off simple, and gradually build to increasingly more complex, more futuristic examples of how this technology might well turn against us, forcing us to solve problems we\'d never considered before. – check it out...
ChatGPT ★★
Cybereason.png 2023-08-21 20:45:00 Analyse des menaces: assembler Lockbit 3.0
THREAT ANALYSIS: Assemble LockBit 3.0
(lien direct)

THREAT ANALYSIS: Assemble LockBit 3.0
Threat ★★
Cybereason.png 2023-08-09 13:00:00 Étendre la détection et la réponse des nuages avec Sysdig et Cybearon
Extend Cloud Detection and Response with Sysdig and Cybereason
(lien direct)

Extend Cloud Detection and Response with Sysdig and Cybereason
Cloud ★★
Cybereason.png 2023-08-08 16:36:00 Podcast de vie malveillant: pourquoi y est-il plus de programmes de primes de bug?
Malicious Life Podcast: Why aren\\'t there more bug bounty programs?
(lien direct)

Malicious Life Podcast: Why aren\'t there more bug bounty programs?
★★
Cybereason.png 2023-07-07 14:20:36 Le nouveau tableau de bord Unified Malop de Cybereason \\
Cybereason\\'s New Unified MalOp Dashboard
(lien direct)
Cybereason DefensePlatform Unified Malop Dashboard Cybearason est ravi d'annoncer un nouveau tableau de bord Unified Malop Alors que les cybermenaces continuent d'évoluer, les équipes du Centre des opérations de sécurité (SOC) sont confrontées à d'immenses défis dans la protection de leurs organisations.Pour réussir, SOC a besoin non seulement de la bonne technologie, mais aussi un effet de levier efficace des personnes et des processus.Pour aider les équipes SOC à rester en avance sur la courbe, la cyber-saison introduit un tableau de bord unifié conçu pour fournir des informations supplémentaires sur les menaces émergentes, les mesures opérationnelles et fournir des informations pour améliorer continuellement les processus et les procédures du SoC.
cybereason defense platform Unified Malop Dashboard Cybereason is excited to announce a new unified Malop Dashboard As cyber threats continue to evolve, Security Operations Center (SOC) teams face immense challenges in protecting their organizations. To be successful SOC needs not only the right technology but effective leverage of people and processes. To help SOC teams stay ahead of the curve, Cybereason introduces a unified dashboard designed to provide additional insights into emerging threats, operational metrics and provide insights to continuously improve SOC processes and procedures.
★★
Cybereason.png 2023-06-21 13:39:09 XDR en 2023: Knight de Cybersecurity \\ ou un autre château dans le nuage?
XDR in 2023: Cybersecurity\\'s Knight or Another Castle in the Cloud?
(lien direct)
xdr cybersecurity 3 questions clés lorsque vous investissez dans des offres XDR Dans le paysage de la cybersécurité d'aujourd'hui, les équipes de sécurité ont besoin d'une plate-forme de détection et de réponse unifiée.Cependant, même avec l'avènement de XDR, les résultats ne sont souvent pas des attentes.Nous recherchons une prévention efficace, une émulation d'attaque, une amélioration et des rapports positifs sur le retour sur investissement.Sans aucun doute, le domaine de l'ingénierie à distance ajoute de la complexité, ce qui rend crucial pour protéger nos employés, nos données et maintenir la disponibilité.Dans le contexte des pressions commerciales de montage, nous devons comprendre comment XDR peut aider à la consolidation des fournisseurs et à la détection et à la réponse gérées.
XDR Cybersecurity 3 Key Questions when Investing in XDR offerings In today\'s cybersecurity landscape, security teams are in dire need of a unified detection and response platform. However, even with the advent of XDR, the outcomes often fall short of expectations. We strive for effective prevention, attack emulation, improvement, and positive ROI reporting. No doubt, the realm of remote engineering adds complexity, making it crucial to protect our employees, data, and maintain uptime. Against a backdrop of mounting business pressures, we need to understand how XDR can help with vendor consolidation and Managed Detection and Response.
★★★
Cybereason.png 2023-05-03 16:20:43 Fondations XDR: éliminer les données de cybersécurité fragmentées
XDR Foundations: Eliminating Fragmented Cybersecurity Data
(lien direct)

XDR Foundations: Eliminating Fragmented Cybersecurity Data
★★
Cybereason.png 2023-05-01 18:33:48 Fondations XDR: tirer parti de l'IA là où cela compte le plus
XDR Foundations: Leveraging AI Where it Matters Most
(lien direct)

XDR Foundations: Leveraging AI Where it Matters Most
★★
Cybereason.png 2023-04-26 14:16:20 La cyberréason annonce la chasse et l'enquête unifiées aux menaces
Cybereason Announces Unified Threat Hunting and Investigation
(lien direct)
Cybearon annonce la chasse et l'enquête unifiées à la menace La cyberréasie est ravie d'annoncer un développement significatif dans son approche pour stocker des données de chasse à long terme (télémétrie collectée par nos capteurs pas \\ 'Données bénignes \' détectées par et liées à un malveillantOpération, ou Threat ★★
Cybereason.png 2023-04-18 14:58:36 All Things Cybereason à la conférence RSA 2023
All Things Cybereason at 2023 RSA Conference
(lien direct)

All Things Cybereason at 2023 RSA Conference
Conference ★★
Cybereason.png 2023-04-03 13:40:01 Cybearason obtient un financement de 100 millions de dollars, nomme un nouveau PDG
Cybereason Secures $100M Funding, Appoints New CEO
(lien direct)
★★
Cybereason.png 2023-03-31 15:08:17 La cyberison détecte et empêche l'attaque de la chaîne d'approvisionnement du 3CXDESKTOPAPPAPPAPPAP [Cybereason Detects and Prevents 3CXDesktopApp Supply Chain Attack] (lien direct)
Cybereason Detects and Prevents 3CXDesktopApp Supply Chain Attack
★★
Cybereason.png 2023-03-15 11:30:00 5 Steps to More Effective Ransomware Response (lien direct) 5 Steps to More Effective Ransomware Response Ransomware Ransomware ★★★
Cybereason.png 2023-03-14 10:00:00 New Study: Ransomware Driving SOC Modernization Requirements (lien direct) New Study: Ransomware Driving SOC Modernization Requirements Ransomware ★★★
Cybereason.png 2023-03-09 15:20:53 Visibility, Response, and Private Infrastructure Protection: Why Cybereason is a 2022 Gartner® Magic Quadrant™ Leader (lien direct) Visibility, Response, and Private Infrastructure Protection: Why Cybereason is a 2022 Gartner® Magic Quadrant™ Leader Guideline ★★
Cybereason.png 2023-03-08 12:58:50 U.S. National Cybersecurity: Strategy at an Inflection Point (lien direct) Biden Cybersecurity Strategy The Biden administration issued a new cybersecurity strategy last week that has many observers applauding its emphasis on regulating minimum cybersecurity standards and enforcing so-called secure by design development practices, among other things.  General Information ★★
Cybereason.png 2023-03-03 13:00:00 Variant Payload Prevention: Applying Data Science to Stop the Stealthiest Threats (lien direct) Variant Payload Prevention: Applying Data Science to Stop the Stealthiest Threats ★★
Cybereason.png 2023-02-28 13:04:02 Cybereason Named a Leader in 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (lien direct) Cybereason Named a Leader in 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Guideline ★★
Cybereason.png 2023-02-23 21:33:59 New Studies Paint Bleak Picture of Future SOC Effectiveness (lien direct) New Studies Paint Bleak Picture of Future SOC Effectiveness Studies ★★★
Cybereason.png 2023-02-14 19:20:18 Ransomware Shifting to the Cloud (lien direct) Ransomware Shifting to the Cloud In the last few years, ransomware attacks have grown considerably. With 75% of organizations being attacked, it seems likely that we'll see a saturation point soon. And attackers have not been resting on their laurels. On the contrary, they have continued to evolve ransomware and are already in the fourth generation of this malicious software. Ransomware ★★
Cybereason.png 2023-02-07 18:17:40 THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise (lien direct) THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise The Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader through heavily-obfuscated JavaScript files. In addition to the new techniques used to load GootLoader, Cybereason also observed Cobalt Strike deployment, which leveraged DLL Hijacking, on top of a VLC MediaPlayer executable. Threat Guideline ★★★
Cybereason.png 2023-02-06 17:41:48 Cybereason advances prevention, data collection, investigation, and management capabilities (lien direct) Cybereason advances prevention, data collection, investigation, and management capabilities General Information ★★★
Cybereason.png 2023-01-31 18:19:20 You Should Be Afraid of SIM Swaps (lien direct) You Should Be Afraid of SIM Swaps If SIM swap stories ever make the news, almost uniformly, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll. Getting cut off from the grid all of a sudden, not knowing why, not being able to call for help. Even when it's over, you never know if your attackers -- whoever they are -- will come back again. ★★★
Cybereason.png 2023-01-24 15:17:03 FBI vs. REvil [ML BSide] (lien direct) FBI vs. REvil [ML BSide] ★★★★★
Cybereason.png 2023-01-20 17:11:49 Cyberbunker, Part 2 (lien direct) Cyberbunker, Part 2 Spamhaus's decision to add Cyberbunker to its list of Spam sources led the Stophaus coalition to initiate a DDoS attack later dubbed “The attack that almost broke the Internet.” The fallout from this attack led to Cyberbunker relocating to a bunker in Germany - but it was the involvement of an Irish drug lord known as 'The Penguin' that led to the bullet-proof hosting company's downfall. Spam ★★
Cybereason.png 2023-01-19 14:00:00 7 Requirements for a Successful XDR Strategy (lien direct) 7 Requirements for a Successful XDR Strategy ★★
Cybereason.png 2023-01-19 13:00:00 Sliver C2 Leveraged by Many Threat Actors (lien direct) Sliver C2 Leveraged by Many Threat Actors What you need to know about this attack framework before it replaces Cobalt Strike Threat ★★★★★
Cybereason.png 2023-01-17 15:21:04 RSA Conference 2023 Promises New Concepts, Diversity of Ideas (lien direct) RSA Conference 2023 Promises New Concepts, Diversity of Ideas The new year is always a time to reflect on what's coming next. As part of the RSA Conference program committee (having worked on the Hackers & Threats track for a number of years), I'm very privileged to see everyone's perspectives. This year I'm happy to report there was a significant growth in the number of submissions suggesting that the collective is starting to look beyond Covid, which definitely hampered the volume and creativity of solutions in recent years. ★★
Cybereason.png 2023-01-11 19:45:06 Cyberbunker, Part 1 (lien direct) Cyberbunker, Part 1 Sven Kamphuis and Herman Johan Xennt are quite dissimilar: one is young, the other is old, one is a Freedom Fighter, the other a businessman. In 1996, their unlikely partnership coalesced around a mutual deep hatred towards authority - and around a very unusual building: a Cold-War era nuclear bunker.   ★★
Cybereason.png 2023-01-10 12:00:00 THREAT ANALYSIS: From IcedID to Domain Compromise (lien direct) THREAT ANALYSIS: From IcedID to Domain Compromise BACKGROUND In this Threat Analysis report, the Cybereason team investigates a recent IcedID infection that illustrates the tactics, techniques, and procedures (TTPs) used in a recent campaign. IcedID, also known as BokBot, is traditionally known as a banking trojan used to steal financial information from its victims. It has been around since at least 2017 and has been tied to the threat group TA551 Threat ★★★★
Cybereason.png 2023-01-09 18:47:58 MITRE ATT&CK and the Art of Building Better Defenses (lien direct) MITRE ATT&CK and the Art of Building Better Defenses MITRE's Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) is a critical tool for security practitioners seeking to understand how attackers move, operate, and conduct their attacks. Designed to look at attacks from the attacker's perspective, it catalogs the attack lifecycle of different adversaries and the platforms they choose to target, all based on real-world observations. Tool ★★
Cybereason.png 2023-01-03 17:01:06 How Netflix Learned Cloud Security [ML B-Side] (lien direct) How Netflix Learned Cloud Security [ML B-Side] 2011 was a pivotal year for Netflix: the now hugely successful company was then in the midst of a formidable transformation, changing from a mail-based DVD rental service to the modern streaming service that it is today. It was at this crucial point in the company's history that Jason Chan, our guest in this episode, was hired by Netflix to lay the foundations for its cloud security protocols. Nate Nelson, our Sr. Producer, spoke with Jason about the decade he spent at the company, what he learned during his tenure there, and the ideas that took shape at that time, such as Chaos Engineering. ★★
Cybereason.png 2022-12-19 21:40:03 Malicious Life Podcast: Fred Cohen, The Godfather of Computer Viruses [ML B-Side] (lien direct) Malicious Life Podcast: Fred Cohen, The Godfather of Computer Viruses [ML B-Side] In his 1984 seminal paper - Computer Viruses: Theory and Experiments - Dr. Fred Cohen not only introduced the name 'computer virus', a term invented by his mentor, Leonard Adelman, but was also the first to analyze computer viruses in a rigorous mathematical way, proving that computer viruses were not only practical - but that they were in fact inevitable. Nate Nelson, our Sr. producer, spoke with Dr. Cohen about his early research into computer viruses, his work with the US army, the panicky response from the US government - and the parallels between computer viruses and mental viruses - i.e. memes. ★★
Cybereason.png 2022-12-14 13:40:44 (Déjà vu) Royal Rumble: Analysis of Royal Ransomware (lien direct) Royal Rumble: Analysis of Royal Ransomware The Royal ransomware group emerged in early 2022 and has gained momentum since the middle of the year. Its ransomware, which the group deploys through different TTPs, has impacted multiple organizations across the globe. The group itself is suspected of consisting of former members of other ransomware groups, based on similarities researchers have observed between Royal ransomware and other ransomware operators. Ransomware ★★★
Cybereason.png 2022-12-13 19:44:39 Case Study: How Cybereason MDR Improved Olist\'s Triage & Response Time (lien direct) Case Study: How Cybereason MDR Improved Olist's Triage & Response Time Olist, a Brazilian e-commerce marketplace integrator, is one of the fastest-growing eCommerce platforms in the world. Last year, for example, it closed four acquisitions and tripled in size. Today, it is rapidly expanding beyond Brazil. ★★
Cybereason.png 2022-12-13 17:30:00 Malicious Life Podcast: Thamar Reservoir (lien direct) Malicious Life Podcast: Thamar Reservoir Thamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts by the Iranian regime, trying to take over her email account and lure her away from her country's borders. Her family, friends, and colleagues have also suffered numerous attacks. So, how does it feel to live for years with a virtual target mark on your back?… ★★
Cybereason.png 2022-12-12 11:00:00 Ransomware: Which Industries Are Most Likely to Pay (lien direct) Ransomware: Which Industries Are Most Likely to Pay A recent study by Cybereason, Ransomware: The True Cost to Business 2022, revealed that 73% of respondents had experienced a ransomware attack in the last 24 months. Of those respondents, 28% said their organizations paid the ransom. A separate survey of cybersecurity leaders conducted by WSJ Pro Research found that 42.5% of respondents said they would consider paying a ransom. Ransomware Guideline ★★★★
Cybereason.png 2022-12-07 12:00:00 What Healthcare CISOs Can Do Differently to Fight Ransomware (lien direct) What Healthcare CISOs Can Do Differently to Fight Ransomware Ransomware attacks cost the healthcare industry over $20 billion in 2020 and show no sign of slowing down. “The current outlook is terrible,” says Israel Barak, CISO of Cybereason. “We are seeing the industry experience an extremely sharp increase in both the quantity and level of sophistication of these attacks.” Ransomware ★★★
Cybereason.png 2022-12-06 19:48:35 The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side] (lien direct) The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side] Nobody likes cheaters, especially in video games: we play games to have fun, and nothing hurts the joy of playing a good game more than losing to a cheater. That is why EA is not the only publisher to implement kernel-mode anti-cheat software in their games: League of Legends and Valorant, for example, use similar software. Yet some people warn that installing such kernel-level systems is extremely dangerous. So, what's the problem with kernel-mode anti-cheat software? ★★★
Cybereason.png 2022-12-05 06:00:00 Threat Analysis: MSI - Masquerading as a Software Installer (lien direct) Threat Analysis: MSI - Masquerading as a Software Installer Threat Threat ★★★
Cybereason.png 2022-12-02 13:00:00 FBI, CISA Issue Warning on Cuba Ransomware (lien direct) FBI, CISA Issue Warning on Cuba Ransomware Ransomware ★★★
Last update at: 2023-11-29 22:10:09
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter